Smartcard vulnerabilities in modern banking malware
(Publication) Google search: [1]
Smartcard vulnerabilities in modern banking malware | |
---|---|
Botnet | Carberp, Ranbyus |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / June 6, 2012 |
Editor/Conference | ESET |
Link | http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware (Archive copy) |
Author | Aleksandr Matrosov |
Type | Blogpost |
Abstract
“ Last week an epic security event took place in Russia – the PHDays’2012 conference. This event started last year as the first conference in Russia for security researchers focusing on deeply technical speakers – all the videos translated into English are already online here.
This year, ESET Canada's Pierre-Marc Bureau presented a workshop on “Win32/Georbot. Understanding a malware and automating its analysis”, about reverse engineering the Georbot trojan. And I and my colleague Eugene Rodionov presented the results of our research into “Smartcard vulnerabilities in modern banking malware”.
Our presentation starts with a consideration of the evolution of the Carberp family of banking malware (we already discussed this in our CARO presentation in May).
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1024, editor = {ESET}, author = {Aleksandr Matrosov}, title = {Smartcard vulnerabilities in modern banking malware}, date = {06}, month = Jun, year = {2012}, howpublished = {\url{http://blog.eset.com/2012/06/05/smartcard-vulnerabilities-in-modern-banking-malware}}, }